Computers, Privacy & the Constitution

View   r184  >  r183  ...
WebHome 184 - 08 Jul 2013 - Main.IanSullivan
Line: 1 to 1
 

Computers, Privacy, & the Constitution

Professor Eben Moglen

Columbia Law School, Spring 2013

Changed:
<
<
>
>
 
Added:
>
>
My office hours are Thursdays 11-1 and 3-4, in JG642, and by arrangement at other times. Please email moglen@columbia.edu for an appointment, or consult my assistant, Ian Sullivan, at 212-461-1905.
 
Changed:
<
<

Technology project 2: Better browsing control

>
>
 
Changed:
<
<
Details and instructions
>
>

Tech project 1: Create a GPG key and upload it to the keyservers

Details and instructions
 
Changed:
<
<

>
>
 
Changed:
<
<
My office hours are Thursdays 11-1 and 3-4, in JG642, and by arrangement at other times. Please email moglen@columbia.edu for an appointment, or consult my assistant, Ian Sullivan, at 212-461-1905.
>
>

Technology project 2: Better browsing control

Details and instructions
 
Changed:
<
<

>
>
 
Changed:
<
<

Tech project 1: Create a GPG key and upload it to the keyservers

>
>

UnderstandingSSLSecurity

 
Changed:
<
<
Linux instructions
>
>
 
Deleted:
<
<
There are a number of tools available to Linux users including many different plugins for popular email clients. I recommend using the enigmail plugin for the Thunderbird mail client as a place to start. Install both tools as you would any other software and then take a look at this quickstart guide from Enigmail: Enigmail quick start
 
Changed:
<
<
OSX Instructions
>
>
 
Changed:
<
<
The GPGTools project maintains an easy installer for GPG and instructional materials for generating a key and uploading it to the keyservers. Take a look at their homepage for the software and a video explanation, then refer to their Where do I start? guide for more detailed instructions.
>
>

Introduction to the NSA surveillance apparatus

 
Changed:
<
<
Windows instructions
>
>
Part 1: Prisms, internet giants, and James Bond
 
Changed:
<
<
The GPG4win project maintains an easy installer for GPG and instructional materials for generating a key and uploading it to the keyservers. Take a look at their homepage for the software, then refer to their Gpg4win Compendium guide for more detailed instructions.
>
>
Part 2: Distilling Our Data
 
Changed:
<
<
>
>
Part 3: Sharing is caring
 
Changed:
<
<
>
>
Part 4: Technology of Power
 
Changed:
<
<

Understanding SSL security

>
>
Summary by IanSullivan
 
Changed:
<
<
Background
>
>
See also "NSA Domestic Spying Program" section of PartFour.
 
Changed:
<
<
Emerging Threats to Online Trust: The Role of Public Policy and Browser Certificates, Presentation, transcript, slides(pdf). October 22, 2010 Declan McCullagh, Why browsers differ on Web sites' safety, CNet, March 28, 2011
>
>

 
Changed:
<
<
Comodo breach
>
>

On The Radar

 
Changed:
<
<
Declan McCullagh and Elinor Mills, Google, Yahoo, Skype targeted in attack linked to Iran, CNet, March 23, 2011 Declan McCullagh and Elinor Mills, Hackers exploit chink in Web's armor, CNet, March 24, 2011
>
>
Jennifer Valentino-Devries and Siobhan Gorman, Secret Court's Redefinition of 'Relevant' Empowered Vast NSA Data-Gathering, Wall Street Journal, July 8, 2013
 
Changed:
<
<
DigiNotar breach
>
>
Philip Dorling, Snowden reveals Australia's links to US spy web, The Age, July 8, 2013
 
Changed:
<
<
Gregg Keizer, Hackers may have stolen over 200 SSL certificates, Computerworld, August 31, 2011 Charles Arthur, Rogue web certificate could have been used to attack Iran dissidents, The Guardian, August 30, 2011
>
>
Christian Stöcker, GCHQ Surveillance: The Power of Britain's Data Vacuum, Der Spiegel, July 07, 2013
 
Changed:
<
<
Flame malware
>
>
Tom Hays, NYC cases show crooked cops' abuse of FBI database, Yahoo News, July 7, 2013
 
Changed:
<
<
Dan Goodin, "Flame" malware was signed by rogue Microsoft certificate, ars technica, June 4, 2012 Lance Whitney, Flame virus can hijack PCs by spoofing Windows Update, CNet, June 5, 2012
>
>
Craig Timberg and Ellen Nakashima, Agreements with private companies protect U.S. access to cables’ data for surveillance, The Washington Post, July 6, 2013
 
Changed:
<
<
TURKTRUST breach
>
>
cgh with wire reports, Snowden Search: Bolivia Irate over Forced Landing, Der Spiegel, July 03, 2013
 
Changed:
<
<
djwm, Fatal error leads TURKTRUST to issue dangerous SSL certificates, H-online, January 4, 2013 Dennis Fisher, TURKTRUST Incident Raises Renewed Questions About CA System, threatpost.com, January 4, 2013
>
>
cgh, Guardian Report: US Engaged in Vast Spying Operation on Europe, Der Spiegel, July 01, 2013
 
Changed:
<
<
>
>
Laura Poitras, Marcel Rosenbach, Fidelius Schmid, and Holger Stark, Attacks from America: NSA Spied on European Union Offices, Der Spiegel, June 29, 2013
 
Changed:
<
<
Glenn Greenwald, Fisa court oversight: a look inside a secret and empty process, The Guardian, June 20, 2013.
>
>
Glenn Greenwald, Fisa court oversight: a look inside a secret and empty process, The Guardian, June 20, 2013
 James Risen and Nick Wingfield, Web’s Reach Binds N.S.A. and Silicon Valley Leaders, The New York Times, June 19, 2013
Line: 79 to 84
 Spiegel Staff, The German Prism: Berlin Wants to Spy Too, Spiegel Online International, June 17, 2013
Changed:
<
<
Ewen MacAskill? , Nick Davies, Nick Hopkins, Julian Borger, and James Ball, GCHQ intercepted foreign politicians' communications at G20 summits, The Guardian, June 16, 2013
>
>
Ewen MacAskill, Nick Davies, Nick Hopkins, Julian Borger, and James Ball, GCHQ intercepted foreign politicians' communications at G20 summits, The Guardian, June 16, 2013
 Stephen Braun, Anne Flaherty, Jack Gillum, and Matt Apuzzo, Secret to Prism program: Even bigger data seizure, Associated Press, June 15, 2013
Line: 113 to 118
 Steve Lohr, Big Data, Trying to Build Better Workers, The New York Times , April 20, 2013
Added:
>
>
D.B. Grady, Inside the secret world of America's top eavesdropping spies, The Week, April 12, 2012
 Max Fisher, Chinese hackers outed themselves by logging into their personal Facebook accounts, The Washington Post, February 19, 2013

Mathew Ingram, The increasingly blurry line between Big Data and Big Brother, Gigaom.com, February 1, 2013


Revision 184r184 - 08 Jul 2013 - 21:43:50 - IanSullivan
Revision 183r183 - 20 Jun 2013 - 22:08:10 - IanSullivan
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM